Show filters
275 Total Results
Displaying 91-100 of 275
Sort by:
Attacker Value
Unknown

CVE-2021-39882

Disclosure Date: October 05, 2021 (last updated February 23, 2025)
In all versions of GitLab CE/EE, provided a user ID, anonymous users can use a few endpoints to retrieve information about any GitLab user.
Attacker Value
Unknown

CVE-2020-20128

Disclosure Date: September 29, 2021 (last updated February 23, 2025)
LaraCMS v1.0.1 transmits sensitive information in cleartext which can be intercepted by attackers.
Attacker Value
Unknown

CVE-2021-22946

Disclosure Date: September 29, 2021 (last updated February 23, 2025)
A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (`--ssl-reqd` on the command line or`CURLOPT_USE_SSL` set to `CURLUSESSL_CONTROL` or `CURLUSESSL_ALL` withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations **withoutTLS** contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.
Attacker Value
Unknown

CVE-2021-39342

Disclosure Date: September 29, 2021 (last updated February 23, 2025)
The Credova_Financial WordPress plugin discloses a site's associated Credova API account username and password in plaintext via an AJAX action whenever a site user goes to checkout on a page that has the Credova Financing option enabled. This affects versions up to, and including, 1.4.8.
Attacker Value
Unknown

CVE-2021-36165

Disclosure Date: September 28, 2021 (last updated February 23, 2025)
RICON Industrial Cellular Router S9922L 16.10.3(3794) is affected by cleartext storage of sensitive information and sends username and password as base64.
Attacker Value
Unknown

CVE-2021-40847

Disclosure Date: September 21, 2021 (last updated February 23, 2025)
The update process of the Circle Parental Control Service on various NETGEAR routers allows remote attackers to achieve remote code execution as root via a MitM attack. While the parental controls themselves are not enabled by default on the routers, the Circle update daemon, circled, is enabled by default. This daemon connects to Circle and NETGEAR to obtain version information and updates to the circled daemon and its filtering database. However, database updates from NETGEAR are unsigned and downloaded via cleartext HTTP. As such, an attacker with the ability to perform a MitM attack on the device can respond to circled update requests with a crafted, compressed database file, the extraction of which gives the attacker the ability to overwrite executable files with attacker-controlled code. This affects R6400v2 1.0.4.106, R6700 1.0.2.16, R6700v3 1.0.4.106, R6900 1.0.2.16, R6900P 1.3.2.134, R7000 1.0.11.123, R7000P 1.3.2.134, R7850 1.0.5.68, R7900 1.0.4.38, R8000 1.0.4.68, and RS400…
Attacker Value
Unknown

CVE-2021-38142

Disclosure Date: September 07, 2021 (last updated February 23, 2025)
Barco MirrorOp Windows Sender before 2.5.3.65 uses cleartext HTTP and thus allows rogue software upgrades. An attacker on the local network can achieve remote code execution on any computer that tries to update Windows Sender due to the fact that the upgrade mechanism is not secured (is not protected with TLS).
Attacker Value
Unknown

CVE-2021-39272

Disclosure Date: August 30, 2021 (last updated February 23, 2025)
Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.
Attacker Value
Unknown

CVE-2021-33883

Disclosure Date: August 25, 2021 (last updated February 23, 2025)
A Cleartext Transmission of Sensitive Information vulnerability in B. Braun SpaceCom2 prior to 012U000062 allows a remote attacker to obtain sensitive information by snooping on the network traffic. The exposed data includes critical values for a pump's internal configuration.
Attacker Value
Unknown

CVE-2021-38373

Disclosure Date: August 10, 2021 (last updated February 23, 2025)
In KDE KMail 19.12.3 (aka 5.13.3), the SMTP STARTTLS option is not honored (and cleartext messages are sent) unless "Server requires authentication" is checked.